IBM Concert 1.0.0 through 2.1.0 could allow a local user to escalate their privileges due to a race condition of a symbolic link.
Advisories

No advisories yet.

Fixes

Solution

IBM strongly recommends addressing the vulnerabilities now by upgrading to IBM Concert Software 2.2.0 Download IBM Concert Software 2.2.0 from Container software library section of IBM Entitled Registry ( ICR https://myibm.ibm.com/products-services/containerlibrary ) and follow installation instructions https://www.ibm.com/docs/en/concert  depending on the type of deployment.


Workaround

No workaround given by the vendor.

History

Wed, 21 Jan 2026 01:00:00 +0900

Type Values Removed Values Added
Title Time-of-check Time-of-use (TOCTOU) in IBM Concert Software. Multiple Vulnerabilities in IBM Concert Software.

Tue, 30 Dec 2025 02:45:00 +0900

Type Values Removed Values Added
CPEs cpe:2.3:a:ibm:concert:*:*:*:*:*:*:*:*

Sat, 27 Dec 2025 01:15:00 +0900

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 26 Dec 2025 23:45:00 +0900

Type Values Removed Values Added
Description IBM Concert 1.0.0 through 2.1.0 could allow a local user to escalate their privileges due to a race condition of a symbolic link.
Title Time-of-check Time-of-use (TOCTOU) in IBM Concert Software.
First Time appeared Ibm
Ibm concert
Weaknesses CWE-367
CPEs cpe:2.3:a:ibm:concert:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:concert:2.1.0:*:*:*:*:*:*:*
Vendors & Products Ibm
Ibm concert
References
Metrics cvssV3_1

{'score': 7.7, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: ibm

Published:

Updated: 2026-01-20T16:02:20.987Z

Reserved: 2025-11-06T18:13:00.558Z

Link: CVE-2025-64645

cve-icon Vulnrichment

Updated: 2025-12-26T15:14:02.534Z

cve-icon NVD

Status : Analyzed

Published: 2025-12-26T15:15:47.213

Modified: 2025-12-29T17:38:35.060

Link: CVE-2025-64645

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses